Category Archives: IT Strategy/Transformation
Readers of The Register speak out on Thin Client technology
Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]
Thin Client Devices Revisited
Technology best forgotten or time for a renaissance?
Assembling the DevOps Jigsaw
The world we live in is increasingly digital. As the smart use of technology leads[...]
Exploiting the Software Advantage
Advances in digital technology create significant opportunities to transform both customer engagement and business operations.[...]
Infrastructure Readiness Temperature Check
IT infrastructures are often coping pretty well with current business requirements, but many IT professionals[...]
User-Centric Mobile Security
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define[...]
Future Proofing Your Network
Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]
Mobile Working without the Tears
As both company and personally owned mobile devices are increasingly used in business, understanding and[...]
Orchestrating the DevOps Tool Chain
A great deal has been written about how trends in digital communication and engagement are[...]
Data Virtualisation for DevOps
The DevOps movement is supported by a whole range of tools, and is particularly well[...]
Justifying end user computing investments
In a nutshell Device proliferation and loss of control over at least some end user[...]
Strategic DevOps Adoption
An interesting remark I heard at a recent CIO gathering was “DevOps is the first[...]
Eight Best Practices for Cloud Security
There’s been a lot of FUD spread around in recent years on the subject of[...]
Virgin Media Business and its SMB proposition
Over the years, I have grown increasingly sceptical about the ability of most Telcos to[...]
The ’feel-good’ factor is good for business
People who feel good while doing their job tend to work better, contribute more and[...]
Devices, recruitment and staff retention
In a nutshell Some say it’s not possible to recruit and retain good staff nowadays[...]
Build a DevOps culture
Everyone’s talking about DevOps, but not everyone can do it. This webcast covers the balance[...]
Snooper-proofing laptops and tablets?
Given how important the company’s data is and the ever more stringent nature of the[...]
A new approach to verifying user identity
By Tony Lock We all know that trying to authenticate our users when they access[...]
Inertia has its virtues, but change is happening
As the old year draws to a close it’s time for CIOs and analysts to[...]
Creating more harmony around end user computing
In a nutshell Tensions frequently arise between business units and the IT teams as users[...]
Rethinking desktop delivery
In a nutshell Many IT professionals are weary of the relentless Windows upgrade spiral and[...]
User flexibility without the risk
In a nutshell Most organisations are seeing users and business groups starting to make their[...]
The Politics and Practicalities of End User Computing
With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many[...]